没有合适的资源?快使用搜索试试~ 我知道了~
首页Certified Ethical Hacker (CEH) Version 9 Cert Guide(2nd) 无水印原版pdf
Certified Ethical Hacker (CEH) Version 9 Cert Guide(2nd) 英文无水印原版pdf 第2版 pdf所有页面使用FoxitReader、PDF-XChangeViewer、SumatraPDF和Firefox测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 查看此书详细信息请在美国亚马逊官网搜索此书
资源详情
资源评论
资源推荐


Certi ed Ethical Hacker
(CEH) Version 9
Cert Guide
Second Edition
800 East 96th Street
Indianapolis, Indiana 46240 USA
Michael Gregg

Certi ed Ethical Hacker (CEH) Version 9 Cert Guide,
Second Edition
Copyright ©2017 by Pearson Education, Inc.
All rights reserved. No part of this book shall be reproduced, stored in
a retrieval system, or transmitted by any means, electronic, mechanical,
photocopying, recording, or otherwise, without written permission from
the publisher. No patent liability is assumed with respect to the use of
the information contained herein. Although every precaution has been
taken in the preparation of this book, the publisher and author assume
no responsibility for errors or omissions. Nor is any liability assumed for
damages resulting from the use of the information contained herein.
ISBN-13: 978-0-7897-5691-6
ISBN-10: 0-7897-5691-9
Library of Congress Control Number: 2017932316
Printed in the United States of America
First Printing: April 2017
Trademarks
All terms mentioned in this book that are known to be trademarks or ser-
vice marks have been appropriately capitalized. Pearson IT Certification
cannot attest to the accuracy of this information. Use of a term in this
book should not be regarded as affecting the validity of any trademark or
service mark.
Warning and Disclaimer
Every effort has been made to make this book as complete and as accurate
as possible, but no warranty or fitness is implied. The information provid-
ed is on an “as is” basis. The author and the publisher shall have neither
liability nor responsibility to any person or entity with respect to any loss
or damages arising from the information contained in this book.
Special Sales
For information about buying this title in bulk quantities, or for special
sales opportunities (which may include electronic versions; custom cover
designs; and content particular to your business, training goals, marketing
focus, or branding interests), please contact our corporate sales depart-
ment at corpsales@pearsoned.com or (800) 382-3419.
For government sales inquiries, please contact
governmentsales@pearsoned.com.
For questions about sales outside the U.S., please contact
intlcs@pearson.com.
Editor-in-Chief
Mark Taub
Product Line Manager
Brett Bartow
Acquisitions Editor
Michelle Newcomb
Development Editor
Ellie C. Bru
Managing Editor
Sandra Schroeder
Senior Project Editor
Tonya Simpson
Copy Editor
Bill McManus
Indexer
Ken Johnson
Proofreader
Gill Editorial Services
Technical Editor
Brock Pearson
Publishing Coordinator
Vanessa Evans
Cover Designer
Chuti Prasertsith
Compositor
Studio Galou

Contents at a Glance
Introduction xxi
CHAPTER 1 An Introduction to Ethical Hacking 3
CHAPTER 2 The Technical Foundations of Hacking 45
CHAPTER 3 Footprinting and Scanning 87
CHAPTER 4 Enumeration and System Hacking 149
CHAPTER 5 Malware Threats 195
CHAPTER 6 Sniffers, Session Hijacking, and Denial of Service 249
CHAPTER 7 Web Server Hacking, Web Applications, and Database Attacks 299
CHAPTER 8 Wireless Technologies, Mobile Security, and Attacks 355
CHAPTER 9 IDS, Firewalls, and Honeypots 397
CHAPTER 10 Physical Security and Social Engineering 441
CHAPTER 11 Cryptographic Attacks and Defenses 481
CHAPTER 12 Cloud Computing and Botnets 525
CHAPTER 13 Final Preparation 545
Glossary 549
Index 573
Online Content:
Glossary
APPENDIX A: Answers to the “Do I Know This Already?” Quizzes and Review
Questions
APPENDIX B: Memory Tables
APPENDIX C: Memory Tables Answer Key

iv Certified Ethical Hacker (CEH) Version 9 Cert Guide
Contents
Introduction xxi
Chapter 1 An Introduction to Ethical Hacking 3
“Do I Know This Already?” Quiz 3
Foundation Topics 6
Security Fundamentals 6
Goals of Security 6
Risk, Assets, Threats, and Vulnerabilities 8
Backing Up Data to Reduce Risk 11
Defining an Exploit 11
Risk Assessment 12
Security Testing 13
No-Knowledge Tests (Black Box) 13
Full-Knowledge Testing (White Box) 14
Partial-Knowledge Testing (Gray Box) 14
Types of Security Tests 14
Hacker and Cracker Descriptions 16
Who Attackers Are 18
Ethical Hackers 19
Required Skills of an Ethical Hacker 20
Modes of Ethical Hacking 21
Test Plans—Keeping It Legal 24
Test Phases 25
Establishing Goals 26
Getting Approval 27
Ethical Hacking Report 28
Vulnerability Research—Keeping Up with Changes 29
Ethics and Legality 29
Overview of U.S. Federal Laws 30
Compliance Regulations 33
Payment Card Industry Data Security Standard (PCI-DSS) 34
Summary 35
Exam Preparation Tasks 35
Review All Key Topics 36
剩余705页未读,继续阅读
















yinkaisheng-nj
- 粉丝: 763
- 资源: 6963
上传资源 快速赚钱
我的内容管理 收起
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助

会员权益专享
最新资源
- Xilinx SRIO详解.pptx
- Informatica PowerCenter 10.2 for Centos7.6安装配置说明.pdf
- 现代无线系统射频电路实用设计卷II 英文版.pdf
- 电子产品可靠性设计 自己讲课用的PPT,包括设计方案的可靠性选择,元器件的选择与使用,降额设计,热设计,余度设计,参数优化设计 和 失效分析等
- MPC5744P-DEV-KIT-REVE-QSG.pdf
- 通信原理课程设计报告(ASK FSK PSK Matlab仿真--数字调制技术的仿真实现及性能研究)
- ORIGIN7.0使用说明
- 在VMware Player 3.1.3下安装Redhat Linux详尽步骤
- python学生信息管理系统实现代码
- 西门子MES手册 13 OpcenterEXCR_PortalStudio1_81RB1.pdf
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈



安全验证
文档复制为VIP权益,开通VIP直接复制

评论0